|
Book Chapters:
- D. Nagothu, N. Poredi, and Y. Chen, "Evolution of Attacks on Intelligent Surveillance Systems and Effective Detection Techniques," Intelligent Video Surveillance - New Perspectives, edited by P. L. Mazzeo, IntechOpen, 978-1-80356-342-8, 2022.
- R. Xu, D. Nagothu, and Y. Chen, "ECOM: Epoch Randomness-based Consensus Committee Configuration for IoT-Blockchains," Principles and Practice of Blockchains, edited by K. Daimi, I. Dionysiou, and N. El Madhoun, Springer, ISBN 978-3-031-10506-7, October 2022.
- R. Xu, Y. Chen, and E. Blasch, "Microchain: a Light Hierarchical Consensus Protocol for IoT System, " Blockchain Applications in IoT: Principles and Practices, edited by T. Choudhury, A. Khanna, T. T. Toe, M. Khurana, and N. G. Nhu, EAI/Springer, ISBN 978-3-030-65690-4, e-ISBN 978-3-030-65691-1, July 2021.
- D. Nagothu, S. Y. Nikouei, R. Xu, X. Zhao, and Y. Chen, "Smart Surveillance for Public Safety enabled by Edge Computing," Edge Computing: Models, Technologies and Applications, edited by J. Taheri and S. Deng, The Institution of Engineering and Technology (IET), ISBN 978-1-785-61940-3, e-ISBN 978-1785619410, August 2020.
- A. Fitwi, Z. Yang, Y. Chen, and X. Lin, "Smart Grids Enabled by Edge Computing," Edge Computing: Models, Technologies and Applications, edited by J. Taheri and S. Deng, The Institution of Engineering and Technology (IET), ISBN 978-1-785-61940-3, e-ISBN 978-1785619410, August 2020.
- R. Xu, Y. Chen, and E. Blasch, "Decentralized Security Solutions for IoT Leveraging the Blockchain and Smart Contract," Modeling and Design of Secure Internet of Things, edited by C. Kamhoua, L. Njilla, A. Kott, and S. Shetty, Wiley-IEEE Press, ISBN 978-1-119-59336-2, June 2020.
- S. Y. Nikouei, R. Xu, and Y. Chen, "Smart Surveillance Video Stream Processing at the Edge for Real-Time Human Objects Tracking," Fog and Edge Computing: Principles and Paradigms, edited by R. Buyya and S. Srirama, Springer, Print ISBN 978-1119524984, Online ISBN: 978-1119525080, Electronic ISBN: 978-1119525066, 2018.
- N. Chen and Y. Chen, "Smart City Surveillance using Fog Computing in IoT Era: Opportunities and Challenges," Smart Cities: Development and Governance Frameworks, edited by Z. Mahmood, Springer, ISBN 978-3-319-76668-3, 2018.
- N. Chen, Y. Chen, X. Ye, and H. Ling, "Smart City Surveillance in Fog Computing," Advances in Mobile Cloud Computing and Bid Data Under the 5G Era, edited by C. X. Mavromoustakis, G. Mastorakis, and C. Dobre, Springer, ISBN 978-3-319-45143-5, Nov. 2016.
- B. Liu and Y. Chen, "Auditing for Data Integrity and Reliability in Cloud Storage," Handbook on Data Centers, edited by S. U. Khan and A. Zomaya, Springer, ISBN 978-1-4939-2091-4, 2015.
- E. Blasch, Y. Chen, G. Chen, D. Shen, and R. Kohler, "Information Fusion in a Cloud-Enabled Environment, " High Performance Semantic Cloud Auditing, edited by B.-Y. Choi, K.-S. Han, and S. Song, Springer, ISBN 978-1-4614-3295-1, Jan. 2013.
- J. Feng, Y. Chen, D. Summerville, and K. Hwang, "Fair Multi-Party Non-Repudiation Framework for Storage Clouds, Part II," Could Computing for Enterprise Architectures, edited by Z. Mahmood and R. Hill, published in "Computer Communications and Networks" book series by Springer, ISBN 978-1-4471-2236-4, 2012.
- J. Feng, Y. Chen, D. Summerville, and K. Hwang, "Fair Multi-Party Non-Repudiation Framework for Storage Clouds, Part I," Could Computing for Enterprise Architectures, edited by Z. Mahmood and R. Hill, published in "Computer Communications and Networks" book series by Springer, ISBN 978-1-4471-2236-4, 2012.
- H. Chen and Y. Chen, "An Experimental Comparison of Collaborative Defense Strategies for Network Security," Pervasive Computing and Networking, edited by I. Woungang, published by John Wiley & Sons Limited, UK, ISBN-10: 0-470-74772-2, ISBN-13: 978-0-470-74772-8, June 2011.
- Y. Chen, J. Feng, W.-S. Ku, P. Liu, and Z. Su, "Secure Distributed Data Storage in Cloud Computing," Cloud Computing, edited by R. Buyya, J. Broberg, and A. Goscinski, published by Wiley, Inc. New York, USA, 2010. ISBN-10: 0470887990, ISBN-13: 978-0470887998.
- H. Chen, J. Feng, Y. Chen, and D. Summerville, "Securing Network Infrastructure using Reconfigurable Hardware Devices," Security Engineering Techniques and Solutions for Information Systems: Management and Implementations, edited by N. Boudriga and M. Hamdi, published by Idea Group, Inc., ISBN 1615208038, March 2010.
- Y. Chen, H. Chen, and W.-S. Ku, "Malicious Node Detection in Wireless Sensor Networks," Security in RFID and Sensor Networks, edited by Josh Y. Zhang and Paris Kitsos, published by Auerbach Publications, Taylor & Francis Group, ISBN 1420068393, 2009.
- Y. Chen and W.-S. Ku, "Distributed Data Aggregation Technology for Real-Time DDoS Attacks Detection," Encyclopedia of Data Warehousing and Mining, 2nd Edition, edited by John Wang, published by IGI Publishing, ISBN 1591405572, August 2008.
Journal/Magazine Papers:
- R. Xu, S. Wei, Y. Chen,G. Chen, E. Blasch, and K. Pham, "LightMAN: A Lightweight Microchained Fabric for Assurance and Resilience Oriented Urban Air Mobility Networks," MDPI Drones, December 2022, 6(12), 421.
- D. Nagothu, R. Xu, Y. Chen, E. Blasch, and A. Aved, "DeFakePro: Decentralized DeepFake Attacks Detection using ENF Authentication," the IEEE IT Professional, Vol. 24, Issue 5, pp. 46 - 52, November 30, 2022.
- R. Xu, Y. Chen, G. Chen, and E. Blasch, "SAUSA: Securing Access, Usage, and Storage of 3D Point Clouds Data by a Blockchain-based Authentication Network," MDPI Future Internet, November 2022, 14(12), 354.
- L. Haghnegahdar, Y. Wang, and Y. Chen, "Enhancing Dynamic Energy Network Management using a Multiagent Cloud-Fog Structure," Renewable and Sustainable Energy Reviews, Vol. 162, July 2022, 112439.
- R. Xu and Y. Chen, "uDFL: A Secure Microchained Decentralized Federated Learning Fabric atop IoT Networks," the IEEE Trans. on Network and Service Management (TNSM), Special Issue on Recent Advances in the Design and Management of Reliable Communication Networks, Vol. 19, Issue 3, pp. 2677 -2688. June 2022.
- D. Nagothu, N. Poredi, Y. Chen, E. Blasch, and A. Aved, "Deterring Deepfake Attacks with An Electrical Network Frequency Fingerprints Approach," MDPI Future Internet - Special Issue on 6G Wireless Channel Measurements and Models: Trends and Challenges, April 2022, 14(5), 125.
- N. Chen and Y. Chen, "Anomalous Vehicle Recognition in Smart Urban Traffic Monitoring as an Edge Service," the MDPI Future Internet - Special Issue on Security of IoT-Enabled Infrastructures in Smart Cities and Critical Systems, February 2022, 14(2), 54.
- A. Fitwi, Y. Chen, and S. Zhu, "Enforcing Privacy-Preservation on Edge Cameras using Lightweight Video Frame Scrambling," the IEEE Transactions on Services Computing, December 2021.
- Q. Qu, R. Xu, Y. Chen, E. Blasch, and A. Aved, "Fair Proof-of-Work (PoW) Consensus for IoT Blockchains Enabled by Miner Twins (MinT)," MDPI Future Internet, Special Issue on Security and Privacy in Blockchains and the IoT, November 2021.
- A. Fitwi, Y. Chen, and S. Zhu, "Lightweight Frame Scrambling Mechanisms for End-to-End Privacy in Edge Smart Surveillance," the IET Smart Cities, Special Issue on Smart Computing for Smart Cities, 2021.
- A. Fitwi, Y. Chen, H. Sun, and R. Harrod, "Estimating Interpersonal Distance and Crowd Density with a Single Edge Camera," the MDPI Computers, October 2021, Vol. 10, No. 11, 143.
- R. Xu, D. Nagothu, and Y. Chen, "EconLedger: A Proof-of-ENF Consensus based Lightweight Distributed Ledger for IoVT Networks," MDPI Future Internet, Special Issue on Blockchain: Applications, Challenges, and Solutions, September 2021, 13(10), 248.
- R. Xu, D. Nagothu, and Y. Chen, "Decentralized Video Input Authentication as an Edge Service for Smart Cities," the IEEE Consumer Electronics Magazine, Special Issue on Advances in Smart Cities, February 2021.
- X. Li and Y. Chen, "Lightweight 2D Imaging for Integrated Imaging and Communication Applications," the IEEE Signal Processing Letters, February 2021.
- D. Nagothu, Y. Chen,A. Aved, and E. Blasch, "Authenticating Video Feeds using Electric Network Frequency Estimation at the edge," the EAI Endorsed Transactions on Security and Safety, February 2021.
- A. Fitwi, Y. Chen, S. Zhu, E. Blasch, and G. Chen, "Privacy-Preserving Surveillance as an Edge Service based on Lightweight Video Protection Schemes using Face De-Identification and Window Masking," MDPI Electronics, Special Issue on 10th Anniversary of Electronics: Recent Advances in Computer Science & Engineering, 2021, Vol. 10, No. 3, 236.
- R. Xu, S. Y. Nikouei, D. Nagothu, A. Fitwi, and Y. Chen, "Blend-SPS: A BLockchain-ENabled Decentralized Smart Public Safety System", MDPI Smart Cities, September 2020.
- S. Y. Nikouei, Y. Chen, A. Aved, and E. Blasch, "I-ViSE: Interactive Video Surveillance as an Edge Service using Unsupervised Feature Queries," the IEEE Internet of Things Journal, Special Issue on Artificial Intelligence Powered Edge Computing for Internet of Things, 2020.
- A. Fitwi, M. Yuan, S. Y. Nikouei, and Y. Chen, "Minor Privacy Protection by Real-Time Children Identification and Face Scrambling at the Edge", the EAI Endorsed Transactions on Security and Safety, Vol. 7, No. 23. e3. ISSN 2032-9393, May 2020.
- D. Nagothu, Y. Chen, E. Blasch, A. Aved, and S. Zhu, "Detecting Malicious False Frame Injection Attacks on Surveillance Systems at Edge using Electrical Network Frequency Signals," Sensors 2019 19 (11), 2424, Special Issue on Intelligent Signal Processing, Data Science and the IoT World, MDPI, May 2019.
- S. Nikouei, Y. Chen, S. Song, B.-Y. Choi, and T. Faughnan, "Toward Intelligent Surveillance as an Edge Network Service (iSENSE) using Lightweight Detection and Tracking Algorithms," the IEEE Transactions on Services Computing (IEEE TSC), May 2019.
- Z. Yang, Yu Chen, N. Zhou, A. Polunchenko, and Y. Liu, "Data-Driven Online Distributed Disturbance Location for Large Scale Power Grids," IET Smart Grid, April 2019, Vol. 2, Issue 3, pp. 381-390.
- R. Xu, Y. Chen, E. Blasch, and G. Chen, "An Exploration of Blockchain Enabled Decentralized Capability-based Access Control Strategy for Space Situational Awareness," Opt. Eng. 58(4), 041609 (2019).
- H. Gebre-Amlak, A. M. A. Jabbari, Y. Chen, B.-Y. Choi, C.-T. Huang, and S. Song, "Agile Polymorphic Software-Defined Fog Computing Platform for Mobile Wireless Controllers and Sensors," Int. J. of Internet Technology and Secured Transactions (IJITST), Vol. 9, No. 4, Sept. 2019.
- T. Gao, F. Li, Y. Chen, and X. Zou, "Local Differential Privately Anonymizing Online Social Networks under HRG-based Model," the IEEE Transactions on Computational Social Systems, Vol. 5, Issue 4, November 2018.
- R. Xu, Y. Chen, E. Blasch, and G. Chen, "BlendCAC: A Smart Contract Enabled Decentralized Capability-based Access Control Mechanism for IoT," Computers 2018 7(3), Special Issue on Mobile Edge Computing, MDPI, July 2018 (MDPI Computers 2019 Best Paper Award).
- B. Liu and Y. Chen, "A Scalable Fine-Grained Analytic Model for Container based Cloud Data Centers," Int. J. of Internet Technology and Secured Transactions (IJITST), Jan. 2018.
- Q. Dong, Z. Yang, Y. Chen, X. Li, and K. Zeng, "Exploration of Singular Spectrum Analysis for Online Anomaly Detection in CRNs," EAI Endorsed Transactions on Security and Safety, Vol. 4, Issue 2, December 2017.
- H. Gebre-Amlak, A. M. A. Jabbari, Y. Chen, B.-Y. Choi, C.-T. Huang, and S. Song, "Agile Polymorphic Software-Defined Fog Computing Platform for Mobile Wireless Controllers and Sensors," Int. J. of Internet Technology and Secured Transactions (IJITST), Sept. 2017.
- R. Wu, B. Liu, Y. Chen, E. Blasch, H. Ling, and G. Chen, "A Container-based Elastic Cloud Architecture for Pseudo Real-time Exploitation of Wide Area Motion Imagery (WAMI) Stream," Special Issue: Dynamic Data Driven Application Systems (DDDAS) Concepts in Signal Processing, Journal of Signal Processing Systems, November 2016.
- T. Gaska, C. Watkins, and Y. Chen, "Integrated Modular Avionics (IMA) Past, Present, and Future," IEEE Aerospace and Electronic Systems, Special Issue on Avionics Systems, Vol. 30, No. 9, September 2015.
- D. Arnold, Q. Gui, Y. Chen, and Z. Jin, "Data Imputation in Patient Monitoring: An Exploration of Significance of Patient Demographics," the International Journal of Intelligent Information Processing (IJIIP), Vol. 5, No.3, 2015.
- Z. Jin and Y. Chen, "Telemedicine in Cloud Era: Prospect and Challenges," IEEE Pervasive Computing, January - March Issue, 2015.
- A. Carpenter and Y. Chen, "Hardware Security in the Dark," Special Issue on Information and System Security, International Journal of Software and Informatics (IJSI), Vol. 8, No. 2, 2014.
- A. Dolgikh, Z. Birnbaum, B. Liu, Y. Chen, and V. Skormin, " Cloud Security Auditing based on Behavioral Modeling," International Journal of Business Process Integration and Management, Vol. 7, No. 2, 2014.
- B. Liu, E. Blasch, Y. Chen, A. J. Aved, A. Hadiks, D. Shen, and G. Chen, "Information Fusion in Cloud Computing Era: A Systems-Level Perspective," IEEE Aerospace and Electronic Systems (AES) Magazine, Vol. 29, No. 10, pp.16-24, October 2014.
- X. Wang, Q. Gui, B. Liu, Z. Jin, and Y. Chen, "Enabling Smart Personalized Healthcare: a Hybrid Mobile-Cloud Approach for ECG Telemonitoring," IEEE Journal of Biomedical and Health Informatics (JBHI), Vol. 18, No. 3, May 2014.
- S. Tong, M. Tong, C. Twigg, Y. Chen, and O. Sadik, "Energy Efficient Control for Smart Wastewater Treatment Plants using Self-Powered Wireless Sensor Networks," Invited Paper, Sensor Letters, Special Issue on Wireless Sensor Networks Technologies and Applications for Smart Spaces, Vol. 11, 2013, pp. 1689-1694.
- H. Chen, T. Gaska, Y. Chen, and D. Summerville, "An Optimal Reconfigurable Power Spectral Density Converter for Real-Time Shrew DDoS Attacks Detection," Computers and Electrical Engineering, Elsevier, Vol. 39, Issue 2, Feb. 2013.
- J. Feng, Y. Chen, and D. Summerville, "A Survey on the Application of the XOR Erasure Code for Distributed Storage System," International Journal of Information, Intelligence and Knowledge, Vol.4, No. 2, 2012.
- J. Feng and Y. Chen, "A Fair Non-Repudiation Framework for Data Integrity in Cloud Storage Services," International Journal of Cloud Computing, Vol. 1, No. 4, 2012.
- H. Chen, Y. Chen, and D. Summerville, "A Survey on the Application of FPGAs for Network Infrastructure Security," the IEEE Communications Surveys and Tutorial, Vol. 13, No. 4, 2011 (pdf).
- H. Hu, Y. Chen, W.-S. Ku, and Z. Su, "Weighted Trust Evaluation Based Malicious Node Detection for Wireless Sensor Networks", International Journal of Information and Computer Security, special issue on Simulation of System Security, Vol. 3, No. 2, 2009.
- Y. Chen and H. Chen, "NeuroNet: An Adaptive Infrastructure for Network Security," International Journal of Information, Intelligence and Knowledge, Vol.1, No.2, 2009 (Link).
- W.-S. Ku, Y. Chen, and R. Zimmermann, "Privacy Protected Spatial Query Processing for Advanced Location Based Services", Journal of Wireless Personal Communications, special issue on Information Security and Data Protection in Future Generation Communication and Networking, Vol. 47, October 2008 (Link).
- Y. Chen, K. Hwang, and W.-S. Ku, "Collaborative Detection of DDoS Attacks over Multiple Network Domains," IEEE Transactions on Parallel and Distributed Systems, Vol. 18, No. 12, December 2007 (pdf).
- Y. Chen and K. Hwang, "Collaborative Detection and Filtering of Shrew DDoS Attacks using Spectral Analysis," Journal of Parallel and Distributed Computing, Special Issue on Security in Grids and Distributed Systems, Vol. 66, Issue 9, September 2006 (pdf).
- K. Hwang, M. Cai, Y.-K. Kwok, S. Song, Yu Chen, and Ying Chen, "DHT-based Security Infrastructure for Trusted Internet and Grid Computing," International Journal on Critical Infrastructures, December 2006 (pdf).
- M. Cai, K. Hwang, Y.-K. Kwok, S. Song, and Y. Chen, "Collaborative Internet Worm Containment," IEEE Security and Privacy Magazine, May/June 2005 (pdf).
- J. Thalken, Y. Chen, A.F.J. Levi, and S. Haas, "Adaptive Quantum Design of Atomic Clusters," Physical Review B, 69, 195410, 2004 (pdf).
- Y. Chen, R. Yu, W. Li, O. Nohadani, S. Haas, and A.F.J. Levi, "Adaptive Design of Nanoscale Dielectric Structures for Photonics," Journal of Applied Physics, 94, 6065-6069, 2003 (pdf).
Peer Reviewed Conference/Workshop Papers:
- R. Xu, S. Nikouei, Y. Chen, S. Song, A. Polunchenko, C. Deng, and T. Faughnan, "Real-Time Human Object Tracking for Smart Surveillance at The Edge," the IEEE International Conference on Communications, Selected Areas in Communications Symposium Smart Cities Track (ICC SmartCities 2018), Kansas City, MO, USA, May 20-24, 2018.
- Z. Yang, N. Chen, Y. Chen, and N. Zhou, "A Novel PMU Fog based Early Anomaly Detection for an Ef?cient Wide Area PMU Network," the 2nd IEEE International Conference on Fog and Edge Computing (ICFEC 2018), Washington DC, USA, May 1-4, 2018.
- R. Xu, Y. Chen, E. Blasch, and G. Chen, "A Federated Capability-based Access Control Mechanism for Internet of Things (IoTs)," the SPIE Defense & Commercial Sensing 2018 (DCS), Conference on Sensors and Systems for Space Applications, Orlando, FL, USA, April 15-19, 2018.
- J. Lu, N. Chen, X. Xiang, D. Shen, G. Chen, E. Blasch, K. Pham, and Y. Chen, "Artificial Intelligence based Directional Mesh Network Design for Spectrum Efficiency," the 39th IEEE Aerospace Conference, Big Sky, Montana, USA, March 3-10, 2018.
- N. Chen, Y. Chen, E. Blasch, H. Ling, Y. You, and X. Ye, "Enabling Smart Urban Surveillance at The Edge," the Second IEEE International Conference on Smart Cloud (SmartCloud 2017), New York, NY, USA, November 3-5, 2017.
- N. Alkassab, C.-T. Huang, Y. Chen, B.-Y. Choi, and S. Song, "Benefits and Schemes of Prefetching from Cloud to Fog Networks," the IEEE 6th International Conference on Cloud Networking (CloudNet 2017), Prague, Czech Republic, September 25-27, 2017.
- Z. Yang, M. Ghorbaniparvar, N. Zhou, and Y. Chen, "Enhancing Sustained Oscillation Detection by Data Pre-Processing Using SSA," the 49th North American Power Symposium (NAPS 2017), Morgantown, WV, USA, Sept. 17-19, 2017.
- Q. Dong, Z. Yang, Y. Chen, X. Li, and K. Zeng, "Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis," the 7th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security (MMM-ACNS 2017), Warsaw, Poland, August 28-30, 2017. [Best Paper Award]
- T. Gao, F. Li, Y. Chen, and X. Zou, "Preserving Local Differential Privacy in Online Social Networks," the 12th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2017), Guilin, China, June 19-21, 2017.
- T. Gaska, Y. Chen, D. Summerville, and M. Gaska, "Model based Design for Advanced Integrated Modular Avionics - Focus and Challenges," the 73rd AHS International Annual Forum, Fort Worth, TX, USA, May 9-11, 2017.
- H. Gebre-Amlak, S. Lee, A. M. A. Jabbari, Y. Chen, B.-Y. Choi, C.-T. Huang, and S. Song, "MIST: Mobility-Inspired SofTware-Defined Fog System," the 2017 International Conference on Consumer Electronics (ICCE), Cloud Computing Track, Las Vegas, NV, USA, January 8 - 11, 2017.
- M. Dabaghchian, S. Liu, A. Alipour-Fanid, K. Zeng, X. Li, and Y. Chen, "Intelligence Measure of Cognitive Radio with Learning Capabilities," the IEEE GlobeCom 2016 - Symposium on Cognitive Radio and Networks, Washington, DC, USA, Dec. 4-8, 2016.
- P. Huang, B. Li, L. Guo, Z, Jin, and Y. Chen, "A Robust and Reusable ECG-based Authentication and Data Encryption Scheme for eHealth System," the IEEE GlobeCom 2016 - Symposium on Communication & Information System Security, Washington, DC, USA, Dec. 4-8, 2016.
- N. Chen, Y. Chen, S. Song, C. Huang, and X. Ye, "Smart Urban Surveillance using Fog Computing," the First IEEE/ACM Symposium on Edge Computing (SEC 2016), Poster, Washington DC, USA, Oct. 27-28, 2016.
- T. Gaska, Y. Chen, and D. Summerville, "Leveraging Driverless Car Investment in Next Generation Avionics IMA," the 35th IEEE Digital Avionics Systems Conference (DASC 2016), Sacramento, CA, USA, Sept. 25-29, 2016.
- B. Poland and Y. Chen, "AUSA Sensing and Commercial UAS Technology Trends," the Military Sensing Symposium, Washington, DC, USA, June 20-24, 2016.
- N. Chen, Y. Chen, Y. You, H. Ling, P. Liang, and R. Zimmermann, "Dynamic Urban Surveillance Video Stream Processing using Fog Computing," the 2nd IEEE International Conference on Multimedia Big Data (BigMM 2016), Invited paper, Taipei, Taiwan, April 20-22, 2016.
- Y. Chen, E. Blasch, N. Chen, A. Deng, H. Ling, and G. Chen, "Real-Time WAMI Streaming Target Tracking in Fog," the 2016 SPIE Defense, Security, and Sensing (DSS), Baltimore, Maryland, USA, April 17 - 21, 2016.
- B. Liu, Y. Lin, and Y. Chen, "A Quantitative Workload Analysis of Google Cluster Traces," the 1st IEEE Workshop on Big Data Sciences, technologies, and Applications (BDSTA 2016), in conjunction with IEEE INFOCOM, San Francisco, CA, USA, April 11, 2016.
- X. Li, Y. Chen, and K. Zeng, "Integration of Machine Learning and Human Learning for Training Optimization in Robust Linear Regression," the 41st IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Shanghai, China, March 2016.
- D. Summerville, K. Zach, and Y. Chen, "Ultra-Lightweight Deep Packet Anomaly Detection for Internet of Things Devices," the 34th IEEE International Performance Computing and Communications Conference (IPCCC), Nanjing, China, Dec. 14-16, 2015.
- Z. Yang, N. Zhou, A. S. Polunchenko, and Y. Chen, "Quick Online Detection of Start Time of Disturbance in Power Grid," the IEEE GlobeCom 2015 - Selected Areas in Communications Symposium: Smart Grid Communications Track, San Diego, CA, USA, Dec. 6-10, 2015.
- B. Poland, Y. Chen, and J. Powell, "Performance Comparison Experiment of Optimized TCP via Emulation and Live Flight on SUAS," the 34th IEEE Military Communication Conference (Milcom 2015), Tampa, FL, USA, Oct. 26 - 28, 2015.
- Wu, B. Liu, Y. Chen, E. Blasch, H. Ling, and G. Chen, "Pseudo-Real-Time Wide Area Motion Imagery (WAMI) Processing for Dynamic Feature Detection," The International Conference on Information Fusion (Fusion 2015) - Special Session on Dynamic Data Driven Application Systems for Sensor Data Problems, Washington DC, USA, July 6-9, 2015.
- R. Wu, A. Deng, Y. Chen, E. Blasch, and B. Liu, "Cloud Technology Applications for Area Surveillances," the 2015 National Aerospace & Electronics Conference (NAECON 15), Dayton, OH., USA, June 16 - 18, 2015.
- Q. Dong, Y. Chen, and S. Towfighian, "MEGA: an Energy Aware Algorithm for Self-Powered Wireless Sensor Networks in Sustainable Smart Infrastructure," the 2nd Workshop on Green Broadband Access: Energy Efficient Wireless and Wired Network Solutions - IEEE GlobeCom 2014, Austin, Texas, USA, Dec. 12, 2014.
- R. Wu, Y. Chen, E. Blasch, B. Liu, and G. Chen, "A Container-Based Elastic Information Fusion Cloud Architecture for Real-Time Full-Motion Video (FMV) Target Tracking," the 2014 IEEE Applied Imagery Pattern Recognition (AIPR) workshop, Washington DC, USA, October 14-16, 2014. [Best Student Poster Award]
- B. Poland, Y. Chen, M. Muccio, and D. Hague, "Context Aware TCP for Intelligence, Surveillance and Reconnaissance Mission on Autonomous Platforms," the Military Communications Conference (MILCOM), Baltimore, MD, USA, October 6-8, 2014.
- B. Liu,Y. Chen, D. Shen, G. Chen, K. Pham, E. Blasch, and B. Rubin, "An Adaptive Process based Cloud Infrastructure for Space Situational Awareness Applications," the 2014 SPIE Defense, Security, and Sensing (DSS), Baltimore, Maryland, USA, May 5 - May 9, 2014.
- A. Hadiks, Y. Chen, F. Li, and B. Liu, "A Study of Stealthy Denial-of-Service Attacks in Wi-Fi Direct Device-to-Device Networks," the 11th Annual IEEE Consumer Communication & Networking Conference, Work-in-Progress (CCNC 2014, WiP), Las Vegas, NV, USA, Jan. 10 - 13, 2014 (pdf).
- J. Hubbard, K. Weimer, and Y. Chen, "A Study of SSL Proxy Attacks on Android and iOS Mobile Applications," the 11th Annual IEEE Consumer Communication & Networking Conference (CCNC 2014), Las Vegas, NV, USA, Jan. 10 - 13, 2014 (pdf).
- R. Golatkar, Y. Chen, and W.-S. Ku, "LAVI: A Location Aware Virtual Infrastructure for VANETs," the 2nd International Conference on Connected Vehicles & Expo. (ICCVE 2013), Las Vegas, NV, USA, Dec. 2 - 6, 2013 (pdf).
- B. Liu, E. Blasch, Y. Chen, D. Shen, and G. Chen, "Scalable Sentiment Classification for Big Data Analysis Using Naive Bayes Classifier," Workshop on Scalable Machine Learning: Theory and Applications, in conjunction with the 2013 IEEE International Conference on Big Data (IEEE Big Data 2013), Santa Clara, CA, USA, October 6-9, 2013 (pdf).
- Q. Gui, B. Liu, X. Wang, Z. Jin, and Y. Chen, "Finding Needles in a Haystack: Reducing False Alarm Rate Using Telemedicine Mobile Cloud," the First Workshop on Mobile Cloud Computing in Healthcare (WMCCH), held in conjunction with IEEE International Conference on Healthcare Informatics (ICHI 2013), Philadelphia, USA, Sept. 9-11, 2013 (pdf).
- B. Liu, Y. Chen, D. Shen, G. Chen, E. Blasch, and Khanh Pham, "A Holistic Cloud-Enabled Robotics System for Real-Time Video Tracking Application," the International Workshop on Cloud Enhanced Information Fusion (CloudFusion 2013), in conjunction with 8th FutureTech Conference, Gwangju, Korea, September 4-6, 2013 (pdf).
- Z. Birnbaum, B. Liu, A. Dolgikh, Y. Chen, and V. Skormin, " Cloud Security Auditing based on Behavioral Modeling," the IEEE 2013 First International Workshop on Cloud Security Auditing (CSAW), Santa Clara Marriott, CA, USA, June 27 - July 2, 2013(pdf).
- A. Dolgikh, Z. Birnbaum, Y. Chen, and V. Skormin, "Behavioral Modeling for Suspicious Process Detection in Cloud Computing Environments," the 2013 International Workshop on Mobile Cloud Computing: Data, Management & Security (mCloud), in conjunction with the 14th IEEE International Conference on Mobile Data Management (IEEE MDM 2013), Milan, Italy, June 3 - 6, 2013 (pdf).
- B. Liu, Y. Chen, D. Shen, G. Chen, K. Pham, and E. Blasch, "A Cloud-based Space Situational Awareness: Initial Design and Evaluation," the 2013 SPIE Defense, Security, and Sensing (DSS), Baltimore, Maryland, USA, April 29 - May 3, 2013 (pdf).
- H. Chen, Y. Chen, D. H. Summerville, and Z. Su, "An Optimized Design of Reconfigurable PSD Accelerator for Online Shrew DDoS Attacks Detection," the 32nd IEEE International Conference on Computer Communications (INFOCOM 2013), Turin, Italy, April 14 - 19, 2013 (pdf).
- X. Wang, Q. Gui, B. Liu, Y. Chen, and Z. Jin, "Leveraging Mobile Cloud for Telemedicine: A Performance Study in Medical Monitoring," the 39th Annual Northeast Bioengineering Conference, Syracuse, NY, April 5 - 7, 2013 (pdf).
- R. I. Ledesma Goyzueta and Y. Chen, "A Deterministic Loss Model based Analysis of CUBIC," the International Conference on Computing, Networking and Communications, Communication QoS and System Modeling Symposium (ICNC 13 - CQSM), San Diego, CA, USA, January 28 - 31, 2013 (pdf).
- B. Kerrigan and Y. Chen, "A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts," the 6th International Conference on Mathematical Methods, Models, and Architecture for Computer Network Security (MMM-ACNS-2012), St. Petersburg, Russia, October 17-20, 2012 (pdf).
- J. Feng, Y. Chen, D. Summerville, and Z. Su, "An Extension of RDP Code with Parallel Decoding Procedure," the 9th IEEE Consumer Communications and Networking Conference (CCNC 2012), Las Vegas, NV, USA, Jan. 14 - 17, 2012 (pdf).
- M. Xiang, Y. Chen, W.-S. Ku, and Z. Su, "Mitigating DDoS Attacks using Protection Nodes in Mobile Ad hoc Networks," the IEEE GlobeCom 2011- Communication & System Security Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011 (pdf).
- Z. Su, P. Ren, and Y. Chen, "Consistency Control to Manage Dynamic Contents over Vehicular Communication Networks," the IEEE GlobeCom 2011- Communications QoS. Reliability, and Modeling Symposium, Huston, Texas, USA, Dec. 5 - 9, 2011 (pdf).
- S. Mazur, E. Blasch, Y. Chen, and V. Skormin, "Mitigating Cloud Computing Security using a Self-Monitoring Defense Scheme," the 2011 National Aerospace & Electronics Conference (NAECON 11), Dayton, OH., USA, July 20 - 22, 2011 (pdf).
- J. Feng, Y. Chen, and D. Summerville, "A Fair Multi-Party Non-Repudiation Scheme for Storage Clouds," the 2011 International Conference on Collaboration Technologies and Systems (CTS 2011), Philadelphia, PA., USA, May 23 - 27, 2011 (pdf).
- Y. Chen, C. Twigg, O. Sadik, and S. Tong, "A Self-Powered Adaptive Wireless Sensor Network for Wastewater Treatment Plants", Work-in-Progress Workshop at the 9th Annual IEEE Conference on Pervasive Computing and Communications (PerCom 2011), Seattle, USA, March 21 - 25, 2011 (pdf).
- J. Feng, Y. Chen, D. Summerville, W.-S. Ku, and Z. Su, "Enhancing Cloud Storage Security against Roll-back Attacks with a New Fair Multi-Party Non-Repudiation Protocol", the 8th IEEE Consumer Communications and Networking Conference - Work-in-Progress Session (CCNC 11), Las Vegas, Nevada, USA, January 9 - 12, 2011 (pdf).
- Y. Chen, C.-J. Wang, W.-S. Ku, and Z. Su, "A Location Aware Virtual Infrastructure for VANETs", the 8th IEEE Consumer Communications and Networking Conference - Work-in-Progress Session (CCNC 11), Las Vegas, Nevada, USA, January 9 - 12, 2011 (pdf).
- H. Chen and Y. Chen, "A Comparison Study of Collaborative Strategies for Distributed Defense against Internet Worms based on Small-World Modeling," the 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, Illinois, USA, Oct. 9 - 12, 2010 (pdf).
- J. Feng, Y. Chen, W.-S. Ku, and P. Liu, "Analysis of Integrity Vulnerabilities and a Non-repudiation Protocol for Cloud Data Storage Platforms," the 2nd International Workshop on Security in Cloud Computing (SCC 2010), held in conjunction with the 39th International Conference on Parallel Processing (ICPP 2010), San Diego, California, USA, Sept. 13, 2010 (pdf).
- J. Feng, Y. Chen, W.-S. Ku, and Z. Su, "D-DOG: Securing Sensitive Data in Distributed Storage Space by Data Division and Out-of-order keystream Generation", the 2010 IEEE International Conference on Communications - Communication and Information System Security Symposium (ICC'10 CISS), Cape Town, South Africa, May 23 - 27, 2010 (pdf).
- J. Feng, Y. Chen, D. Summerville, "EEO: an Efficient MDS-like RAID-6 Code for Parallel Implementation," the 33rd IEEE Sarnoff Symposium, Apr. 12-14, 2010, Princeton, NJ, USA (pdf).
- P. Gasti and Y. Chen, "Breaking and Fixing the Self-Encryption Scheme for Data Security in Mobile Devices", the 18th Euromicro International Conference on Parallel, Distributed and network-based Processing (PDP 2010) - Special Session "Security in Networked and Distributed Systems" (SNDS 2010), Pisa, Italy, February 17 - 19, 2010 (pdf).
- J. Feng, Y. Chen, and P. Liu, "Bridging the Missing Link of Cloud Data Storage Security in AWS", the 7th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC 10, Short Position Paper), Las Vegas, Nevada, USA, January 9 - 12, 2010 (pdf).
- Y. Chen, W.-S. Ku, K. Sakai, and C. DeCruze, "A Novel DDoS Attack Defending Framework with Minimized Bilateral Damages", the 7th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC 10), Las Vegas, Nevada, USA, January 9 - 12, 2010 (pdf).
- H. Chen, D. Summerville, and Y. Chen, "Two-Stage Decomposition of SNORT Rules towards Efficient Hardware Implementation," the 7th International Workshop on Design of Reliable Communication Networks (DRCN 2009), Washington, D.C., USA, October 25 - 28, 2009 (pdf).
- Z. Su, Z. Zhang, and Y. Chen, "Performance Evaluation of a Novel Caching Algorithm for Scalable Image Contents," the 2nd International Symposium on Intelligent Informatics (ISII 2009), Qinhuangdao, China, September 13 - 15, 2009.
- I. Atakli, Y. Chen, Q. Wu, and S. Craver, "BLINK: Pixel-Domain Encryption for Secure Document Management", the 11th ACM Workshop on Multimedia and Security (MMSEC 2009), Princeton, New Jersey, USA, September 7 - 8, 2009 (pdf).
- Y. Chen and W.-S. Ku, "Self-Encryption Scheme for Data Security in Mobile Devices", the 6th IEEE Consumer Communications and Networking Conference - Security for CE Communications (CCNC 09), Las Vegas, Nevada, USA, January 10 - 13, 2009 (pdf).
- S. Craver, Y. Chen, H. Chen, J. Yu, and I. M. Atakli, "BLINK: Securing Information to the Last Connection", the 6th IEEE Consumer Communications and Networking Conference (CCNC 09 Short Paper), Las Vegas, Nevada, USA, January 10 - 13, 2009 (pdf).
- Z. Su, J. Katto, Y. Yasuda, and Y. Chen, "Consistency Control for Dynamic Contents in Mobile Overlay Network," the 3rd International Conference on Communications and Networking in China (ChinaCom 08), Hangzhou, China, August 25 - 27, 2008 (pdf). [Best Paper Award]
- Z. Su, Z. Zhang, and Y. Chen, "Retrieve Scalable Image Contents over Image Contents Network by Efficient Caching Algorithms," the 3rd International Conference of Innovative Computing, Information and Control (ICICIC 2008), Dalian, China, June 18 - 20, 2008.
- H. Chen and Y. Chen, "A Novel Embedded Accelerator for Online Detection of Shrew DDoS Attacks," the 2008 IEEE International Conference on Networking, Architecture, and Storage (NAS 08), Chongqing, China, June 12 - 14, 2008 (pdf).
- Y. Chen, J. Bao, W.-S. Ku, and J.-L. Huang, "Cache Management Techniques for Privacy Protected Location-based Services," the 2nd International Workshop on Privacy-Aware Location-based Mobile Services (PALMS'08), in conjunction with the 9th International Conference on Mobile Data Management (MDM 08), Beijing, China, April 27, 2008(pdf).
- I. Atakli, H. Hu, Y. Chen, W.-S. Ku, and Z. Su, "Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation," the ACM/SIGSIM Symposium on Simulation of System Security (SSSS'08), Ottawa, Canada, April 14-17, 2008 (pdf).
- Y. Chen, "NeuroNet: Towards an Intelligent Internet Infrastructure," the 5th IEEE Consumer Communications and Networking Conference (CCNC'08), Las Vegas, NV, January 10-12, 2008 (pdf).
- Y. Chen, W.-S. Ku, and K. Hwang, "Distributed Change-Point Detection of DDoS Attacks: Experimental Results on DETER Testbed," DETER Community Workshop on Cyber Security Experimentation and Test, in conjunction with USENIX Security Symposium (Security 07), Boston, MA, August 6-7, 2007 (pdf).
- Y. Chen and K. Hwang, "Spectral Analysis of TCP Flows for Defense against Reduction-of-Quality Attacks," the 2007 IEEE International Conference on Communications (ICC'07), Glasgow, Scotland, June 24-28, 2007 (pdf).
- Y. Chen and K. Hwang, "Collaborative Change Detection of DDoS Attacks on Community and ISP Networks," the IEEE International Symposium on Collaborative Technologies and Systems (CTS'06), Las Vegas, NV., USA, May 15-17, 2006 (pdf).
- Y. Chen, K. Hwang, and Y.-K. Kwok, "Filtering of Shrew DDoS Attacks in Frequency Domain," the First IEEE LCN Workshop on Network Security (WoNS), held in conjunction with the 30th Annual IEEE Conference of Local Computer Networks (LCN 2005), Sydney, Australia, Nov. 15-17, 2005 (pdf).
- Y.-K. Kwok, R. Tripathi, Y. Chen, and K. Hwang, "HAWK: Halting Anomalies with Weighted Choking to Rescue Well-Behaved TCP Sessions from Shrew DoS Attacks," the 2005 International Conference on Computer Networks and Mobile Computing (ICCNMC'05), Zhangjiajie, China, Aug. 2-4, 2005 (pdf).
- Y. Chen, Y.-K. Kwok, and K. Hwang, "MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks," in Proceedings of the 2nd International Workshop on Security in Distributed Computing Systems (SDCS'05), in conjunction with ICDCS 2005, Columbus, OH., USA, June 6-10, 2005 (pdf).
- K. Hwang, Y.-K. Kwok, S. Song, M. Cai, Yu Chen, R. Zhou, Ying Chen, and X. Lou, "GridSec: Trusted Grid Computing with Security Binding and Self-Defense against Network Worms and DDoS Attacks," in Proceedings of International Workshop on Grid Computing Security and Resource Management (GSRM-2005), in conjunction with the ICCS-2005. Atlanta, GA. May 22-24, 2005 (pdf).
Selected Other Publications:
- A. A. Cardenas, Y. Chen, A. Fuchs, W. Van Ginkel, D. Hiestand, S. Jani, A. Lane, R. Lu, P. K. Manadhata, J. Molina, P. Murthy, A. Roy, S. Sathyadevan, P. S. Subrahmanyam, and N. Sundaresan, "Big Data Security and Privacy Handbook: 100 Best Practices in Big Data Security and Privacy," Cloud Security Alliance (CSA), Aug. 2016, edited by D. Mashima and S. P. Rajan, available at https://cloudsecurityalliance.org/download/big-data-security-and-privacy-handbook/.
- A. Bardhan, Y. Chen, A. Fuchs, A. Kapre, A. Lane, R. Lu, P. Manadhata, J. Molina, A. C. Mora, P. Murthy, A. Roy, S. Sathyadevan, and N. Shah, "Top Ten Big Data Security and Privacy Challenges," Cloud Security Alliance (CSA) Annual Congress 2012, Orlando, FL, USA, Nov. 7, 2012, organized by S. P. Rajan, W. van Ginkel, and N. Sundaresan, available at https://cloudsecurityalliance.org/download/expanded-top-ten-big-data-security-and-privacy-challenges/.
- Y. Chen, X. Zhong, S. Xiao, K. Li, "A MEMS CAD System Based on CORBA," International Symposium on Smart Structures and Microsystems (IS3M 2000), Hong Kong, OCt. 19-21, 2000.
- K. Li, X. Zhong, and Y. Chen, "Design for Micro Diffractive Lens for Imaging," International Symposium on Smart Structures and Microsystems (IS3M 2000), Hong Kong, OCt. 19-21, 2000.
- Y. Chen, X. Zhong, and K. Li, "A Distributed MEMS CAD Based on 3-Tier Structure," Journal of Micro-Nanometer Science & Technology, Vol. 5, No. 1, 2000, pp 78-81. (Chinese)
- K. Li, X. Zhong, and Y. Chen, "Compensation Network for Multiple Intensity Modulated Optical Fiber Sensors," International Conference on Sensors and Control Techniques (ICSC 2000), Wuhan, China, May 2000.
- Y. Chen, X. Zhong, and K. Li, "A Survey of Research Achievement of MEMS CAD," Journal of Optics and Precision Engineering, Vol. 17, No. 6, 1999, pp 1-5. (Chinese)
- Y. Chen, X. Zhong, D. Xu, and K. Li, "Micro-Mechanical Array Filter," Journal of Scientific Instrument, Vol. 20, No. 4, 1999, pp 200-203. (Chinese)
- K. Li, X. Zhong, and Y. Chen, "Status of Microsystem Technology in Blood Cell Detection and its Perspective," Journal of Scientific Instrument, Vol. 20, No. 4, 1999, pp 176-179. (Chinese)
- S. Xiao, X. Zhong, Y. Chen, and X. Miu, "Study on an Image Measurement for Irregular Rotary Objects," Journal of Optics and Precision Engineering, Vol. 15, No. 4, 1997, pp 99-103. (Chinese)
- G. Liu, X. Zhong, K. Li, and Y. Chen, "Characteristic Study of Light Intensity Modulation Methods for Fiber-Optic Vibration Sensor and Cantilaver," Journal of Transducer Technology, No. 3, 1995, pp 20-23. (Chinese)
Technical Presentations:
- the AFCEA Cyber and Information Challenges Conference, Marcy, NY, USA., June 2012.
- EITC'2011, Chicago, Illinois, USA, July 28-29, 2011.
- CCNC 10, Las Vegas, NV, January 2010
- DRCN'09, Washington DC, October 2009
- CCNC 09, Las Vegas, NV, January 2009
- IEEE NAS 08, Chongqing, China, June 2008
- SSSS 08, Ottawa, Canada, April 2008
- CCNC 08, Las Vegas, NV, January 2008
- DETER 07, Boston, MA, August 2007
- IEEE ICC 2007, Glasgow, Scotland, June 2007
- IEEE CTS 06, Las Vegas, NV, May 2006
- IEEE SDCS 2005, Columbus, OH, USA, June 2005
- SPIE Annual Meeting, Denver, CO, USA, August 2004
|